-
公开(公告)号:US20160224784A1
公开(公告)日:2016-08-04
申请号:US14612067
申请日:2015-02-02
Applicant: QUALCOMM Incorporated
Inventor: Arvind KRISHNASWAMY , Can ACAR , Robert TURNER
CPC classification number: G06F21/52 , G06F11/10 , G06F12/0875 , G06F15/7846 , G06F21/44 , G06F21/51 , G06F2212/451
Abstract: A method of producing a control stack includes: writing a plurality of control information entries into a control stack buffer that is internal to a processor in response to one or more function calls; and in response to the control stack buffer being full and receiving a further function call, writing: the plurality of control information entries to an external memory that is external to the processor; and a further control information entry, corresponding to the further function call, to the control stack buffer.
Abstract translation: 一种产生控制堆栈的方法包括:响应于一个或多个功能调用将多个控制信息条目写入处理器内部的控制堆栈缓冲器; 并且响应于所述控制堆栈缓冲器已满并接收另外的功能调用,将所述多个控制信息条目写入到处理器外部的外部存储器; 以及对应于进一步的功能调用的另一个控制信息条目提供给控制栈缓冲器。
-
公开(公告)号:US20200020330A1
公开(公告)日:2020-01-16
申请号:US16036538
申请日:2018-07-16
Applicant: QUALCOMM Incorporated
Inventor: Xu GUO , Arvind KRISHNASWAMY , Liang CAI , Nabanita SEN , Jyotsna KRISHNASWAMY , Kenneth CHEN
Abstract: Techniques for operating a voice-activated computing device are provided. These techniques can be used to prevent voice-based attacks on such devices. An example method according to these techniques includes receiving audio content comprising a voice command, monitoring electromagnetic (EM) emissions using an EM detector of the voice-activated computing device, determining whether the audio content comprising the voice command was generated electronically or was issued by a human user based on the EM emissions detected while receiving the audio content comprising the voice command, and preventing the voice command from being executed by the voice-activated computing device responsive to determining that the voice command was generated electronically.
-
公开(公告)号:US20240403411A1
公开(公告)日:2024-12-05
申请号:US18697722
申请日:2022-11-17
Applicant: QUALCOMM Incorporated
Inventor: Sundeep KUSHWAHA , Arvind KRISHNASWAMY , Sergei LARIN , Can ACAR , Tianshuo SU , Awanish PANDEY , Richard SENIOR
Abstract: Various embodiments include methods and devices for maintaining control flow integrity in computing devices. Embodiments may include identifying indirect function call candidate functions from a source code by a compiler, replacing, by the compiler, an indirect function call from the source code with a call to a wrapper function, and collocating the indirect function call candidate functions in at least one range of addresses of memory by a linker. The wrapper function may be configured to determine whether an address to be passed to the indirect function call is within the at least one range of addresses of memory.
-
公开(公告)号:US20220237283A1
公开(公告)日:2022-07-28
申请号:US17160769
申请日:2021-01-28
Applicant: QUALCOMM Incorporated
Inventor: Arvind KRISHNASWAMY , Suresh Kumar VENKUMAHANTI , Charles TABONY
Abstract: Methods, systems, and devices for techniques for instruction perturbation for improved device security are described. A device may assign a set of executable instructions to an instruction packet based on a parameter associated with the instruction packet, and each executable instruction of the set of executable instructions may be independent from other executable instructions of the set of executable instructions. The device may select an order of the set of executable instructions based on a slot instruction rule associated with the device, and each executable instruction of the set of executable instructions may correspond to a respective slot associated with memory of the device. The device may modify the order of the set of executable instructions in a memory hierarchy post pre-decode based on the slot instruction rule and process the set of executable instructions of the instruction packet based on the modified order.
-
公开(公告)号:US20160110545A1
公开(公告)日:2016-04-21
申请号:US14517572
申请日:2014-10-17
Applicant: QUALCOMM Incorporated
Inventor: Can ACAR , Arvind KRISHNASWAMY , Robert TURNER
CPC classification number: G06F21/56 , G06F21/52 , G06F21/554
Abstract: Techniques for enforcing flow control of a software program in a processor are provided. An example method according to these techniques includes analyzing program code of the software program to identify a code pointer in the program code, generating an authentication tag based on the code pointer, and modifying the code pointer in the program code with the authentication tag to generate a tagged code pointer.
Abstract translation: 提供了用于在处理器中执行软件程序的流控制的技术。 根据这些技术的示例性方法包括分析软件程序的程序代码以识别程序代码中的代码指针,基于代码指针生成认证标签,并用认证标签修改程序代码中的代码指针以产生 一个标记的代码指针。
-
-
-
-